Patents by Inventor Michael S. Brown

Michael S. Brown has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8214645
    Abstract: Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an image or audio signal. The image or audio signal is transmitted from the first computing device to the second computing device. The password is determined from the image or audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein.
    Type: Grant
    Filed: April 8, 2009
    Date of Patent: July 3, 2012
    Assignee: Research In Motion Limited
    Inventors: Michael S. Brown, Herbert A. Little
  • Patent number: 8209530
    Abstract: A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one broad aspect, a method is provided in which a certificate search request is received, a search of one or more certificate servers for certificates satisfying the request is performed, located certificates are retrieved and processed at a first computing device to determine data that uniquely identifies each located certificate, and search result data comprising the determined data is communicated to a second device (e.g. a mobile device) for use in determining whether each located certificate is already stored on the second device.
    Type: Grant
    Filed: December 22, 2009
    Date of Patent: June 26, 2012
    Assignee: Research In Motion Limited
    Inventors: Neil P. Adams, Michael S. Brown, Herbert A. Little
  • Publication number: 20120159164
    Abstract: A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device.
    Type: Application
    Filed: October 31, 2011
    Publication date: June 21, 2012
    Inventors: Michael K. Brown, Neil P. Adams, Michael S. Brown
  • Publication number: 20120159150
    Abstract: A system and method for implementing an enhanced transport layer security (ETLS) protocol is provided. The system includes a primary server, an ETLS servlet and an ETLS software module. The primary server operates on a computer network and is configured to communicate over the computer network using a non-proprietary security protocol. The ETLS servlet also operates on the computer network and is securely coupled to the primary server. The ETLS servlet is configured to communicate over the computer network using an ETLS security protocol. The ETLS software module operates on a mobile device, and is configured to communicate over the computer network using either the non-proprietary security protocol or the ETLS security protocol. Operationally, the ETLS software module initially contacts the server over the computer network using the non-proprietary security protocol, and subsequently contacts the server through the ETLS servlet using the ETLS security protocol.
    Type: Application
    Filed: February 22, 2012
    Publication date: June 21, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael S. BROWN, Herbert A. Little, David P. Yach
  • Publication number: 20120143975
    Abstract: A communication device is configured to receive messages. The communication device may comprise a display screen upon which messages are displayed. A microprocessor configured to execute at least one message management program on the communication device, filters incoming messages. The message management program comprising a message filter application filters received messages based on a comparison of sender identification data associated with a received message to approved sender identification data.
    Type: Application
    Filed: February 10, 2012
    Publication date: June 7, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael K. BROWN, Michael S. BROWN, Michael E. MCCALLUM
  • Patent number: 8194857
    Abstract: System and methods for processing encoded messages at a message receiver are described. Encoded message processing is performed in multiple stages. In a first stage, a new received message is at least partially decoded by performing any decoding operations that require no user input and a resulting context object is stored in memory, before a user is notified that the new message has been received. When the user accesses the new message, any further required decoding operations are performed on the stored context object in a second stage of processing. The message can subsequently be displayed or otherwise processed relatively quickly, without repeating the first stage decoding operations. Decoding operations may include signature verification, decryption, other types of decoding, or some combination thereof.
    Type: Grant
    Filed: October 24, 2002
    Date of Patent: June 5, 2012
    Assignee: Research In Motion Limited
    Inventors: Herbert A. Little, Michael S. Brown, Michael K. Brown
  • Publication number: 20120137341
    Abstract: A system and method for determining a security encoding to be applied to a message being sent by a user of a computing device. In one broad aspect, the device comprises a processor configured to: determine whether a general message encoding configuration setting indicates that when a security encoding is to be applied to a message then the security encoding is to be established by a policy engine; if the general message encoding configuration setting so indicates, query the policy engine for the security encoding to be applied to the message; otherwise, determine the security encoding to be applied to the message in accordance with a user-selected security encoding; and apply the determined security encoding to the message prior to transmission of the message to at least one recipient.
    Type: Application
    Filed: December 13, 2011
    Publication date: May 31, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael K. Brown, Michael S. Brown, Michael G. Kirkup
  • Publication number: 20120129062
    Abstract: A reactor system is integrated internally within an anode-side cavity of a fuel cell. The reactor system is configured to convert higher hydrocarbons to smaller species while mitigating the lower production of solid carbon. The reactor system may incorporate one or more of a pre-reforming section, an anode exhaust gas recirculation device, and a reforming section.
    Type: Application
    Filed: November 18, 2010
    Publication date: May 24, 2012
    Inventors: Neil Edward Fernandes, Michael S. Brown, Praveen Cheekatamarla, Thomas Deng, James Dimitrakopoulos, Anthony F. Litka
  • Publication number: 20120122425
    Abstract: A mobile communications device for the display of an incrementally received message includes a message viewer application for scanning the received portions of the message. On determination that the received portion of the message includes a first displayable portion of the message content, the system signals to a message server to halt the message server from forwarding further portions of the message content. The system provides a mechanism for the user of the mobile communications device to cause the mobile communications device to further signal the message server to recommence the forwarding of further portions of the secure message content to permit the verification of the e-mail based on the further portions of the secure message content.
    Type: Application
    Filed: November 15, 2010
    Publication date: May 17, 2012
    Inventors: Neil P. ADAMS, Michael S. Brown, Herbert A. Little, Michael K. Brown
  • Publication number: 20120124371
    Abstract: One embodiment of a method of authenticating data comprises: receiving, at a device, data in a plurality of indexed packets transmitted by a data server, the data of the indexed packets being at least a portion of a larger data stream; receiving, at the device, from a data authentication server connected to the device by a network, a server-computed authentication value based on a subset of the data transmitted by the data server, the data authentication server having access to the data that was transmitted from the data server to the device; and comparing a device-computed authentication value based on a subset of the received data, corresponding to the subset of the data transmitted by the data server, with the server-computed authentication value in order to determine whether the subset of the data received at the device is authentic.
    Type: Application
    Filed: November 18, 2011
    Publication date: May 17, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael K. Brown, David F. Tapuska, Michael S. Brown
  • Publication number: 20120117616
    Abstract: A mobile wireless communication device also has at least one wired communication port. Enhanced security is achieved by permitting the device to automatically disable one or more wireless ports when connected to a wired port. Specific combinations/permutations of such automatic control may be effected by use of an IT Policy also resident on the device.
    Type: Application
    Filed: January 12, 2012
    Publication date: May 10, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael G. KIRKUP, Michael K. BROWN, Herbert A. LITTLE, Ian Robertson, Michael S. BROWN
  • Patent number: 8171292
    Abstract: Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an image or audio signal. The image or audio signal is transmitted from the first computing device to the second computing device. The password is determined from the image or audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein.
    Type: Grant
    Filed: April 8, 2009
    Date of Patent: May 1, 2012
    Assignee: Research In Motion Limited
    Inventors: Michael S. Brown, Herbert A. Little
  • Patent number: 8166530
    Abstract: Systems and methods are provided for facilitating access to an electronic device. Password information is stored on the electronic device, and on a portable authenticator. When a user attempts to access the electronic device, the user is prompted to enter a password at the electronic device. The portable authenticator determines the validity of the entered password. The electronic device receives the results of the validity determination from the portable authenticator, and provides access to the electronic device based on the received validity determination.
    Type: Grant
    Filed: April 7, 2004
    Date of Patent: April 24, 2012
    Assignee: Research In Motion Limited
    Inventors: Neil P. Adams, David Tapuska, Michael S. Brown, Herbert A. Little
  • Publication number: 20120084556
    Abstract: A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, all certificates related to an identified certificate are retrieved from the certificate servers automatically by the certificate synchronization application, where the related certificates comprise at least one of one or more CA certificates and one or more cross-certificates. Embodiments described herein facilitate at least partial automation of the downloading and establishment of certificate chains, thereby minimizing the need for users to manually search for individual certificates.
    Type: Application
    Filed: December 13, 2011
    Publication date: April 5, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael S. Brown, Michael K. Brown, Herbert A. Little, Neil P. Adams, Michael G. Kirkup
  • Publication number: 20120084376
    Abstract: A method and apparatus for processing digitally signed messages in which address mismatch errors are detected. In at least one aspect, the number of address mismatch errors reported to a user for a message may be minimized for messages that properly incorporate message portions signed by someone other than the sender of the message, as may be the case where the message contains a conversation thread for example, by performing at least one pre-determined action for digital signatures corresponding to signed data appearing after a message separator. The message separator may indicate that the message contains data from an older forwarded message or from an older message that has been replied to, for example. The at least one-predetermined action may comprise bypassing verification of address matches for those digital signatures, or verifying address matches for those digital signatures but suppressing user notification of any address mismatch errors, for example.
    Type: Application
    Filed: December 13, 2011
    Publication date: April 5, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael K. Brown, Michael G. Kirkup, Michael S. Brown
  • Publication number: 20120079269
    Abstract: Systems and methods for processing messages within a wireless communications system are disclosed. A server within the wireless communications system maintains a list of certificates contained in devices that use the server. The server synchronizes or updates the list of certificates based on information contained in message to and from the device. By providing a server with certificates associated with devices that use the server, and providing a system and method for synchronizing the certificates between the device and server, the server can implement powerful features that will improve the efficiency, speed and user satisfaction of the devices.
    Type: Application
    Filed: December 9, 2011
    Publication date: March 29, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael K. BROWN, Michael S. BROWN, Herbert A. LITTLE, Neil P. ADAMS
  • Publication number: 20120079603
    Abstract: A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level.
    Type: Application
    Filed: September 26, 2011
    Publication date: March 29, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael K. BROWN, Michael S. BROWN, Herbert A. LITTLE, Scott W. TOTZKE
  • Patent number: 8145896
    Abstract: A system and method for implementing an enhanced transport layer security (ETLS) protocol is provided. The system includes a primary server, an ETLS servlet and an ETLS software module. The primary server operates on a computer network and is configured to communicate over the computer network using a non-proprietary security protocol. The ETLS servlet also operates on the computer network and is securely coupled to the primary server. The ETLS servlet is configured to communicate over the computer network using an ETLS security protocol. The ETLS software module operates on a mobile device, and is configured to communicate over the computer network using either the non-proprietary security protocol or the ETLS security protocol. Operationally, the ETLS software module initially contacts the server over the computer network using the non-proprietary security protocol, and subsequently contacts the server through the ETLS servlet using the ETLS security protocol.
    Type: Grant
    Filed: December 7, 2009
    Date of Patent: March 27, 2012
    Assignee: Research In Motion Limited
    Inventors: Michael S. Brown, Herbert A. Little, David P. Yach
  • Patent number: 8140863
    Abstract: A mobile communications device, server, and method for providing security on a mobile communications device are described.
    Type: Grant
    Filed: May 18, 2007
    Date of Patent: March 20, 2012
    Assignee: Research In Motion Limited
    Inventors: Michael S. Brown, Neil Adams, Steven Fyke, Herbert Little
  • Publication number: 20120066505
    Abstract: A method and system are provided for resetting a password using a first device and a second device. The second device stores data encrypted using a content protection key, which itself is stored in encrypted form using the password, and is also stored in encrypted form using a key encryption key. The first device receives a public key from a second device. The first device uses the public key and a stored private key to generate a further public key. The further public key and a new password are sent to the second device. The second device uses the further public key to generate the key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key is created, and encrypted using the new password.
    Type: Application
    Filed: October 14, 2011
    Publication date: March 15, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael K. BROWN, Michael S. BROWN, Herbert A. LITTLE